acrxEntryPoint
odrxCreateModuleObject
odrxGetAPIVersion
Static task
static1
Behavioral task
behavioral1
Sample
dfc167b8c3a99bf2f311a56342e3df7a6e2d1ee15d48a5fb57510df76d3d7301.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfc167b8c3a99bf2f311a56342e3df7a6e2d1ee15d48a5fb57510df76d3d7301.dll
Resource
win10v2004-20240412-en
Target
dfc167b8c3a99bf2f311a56342e3df7a6e2d1ee15d48a5fb57510df76d3d7301
Size
403KB
MD5
5eca6f08f5f4c18c543d57fae9d59eab
SHA1
46e2cf3e038cdffb032239e82a76255f7b047283
SHA256
dfc167b8c3a99bf2f311a56342e3df7a6e2d1ee15d48a5fb57510df76d3d7301
SHA512
ba3735e892d7e53d4e73dc1956966057dc0e28cefcbdc4762b9b413af1e0b74db837689b64d3f4f9e07cef61e1e6c4ea74ce9cfa10d0b352c434f4511755ddec
SSDEEP
3072:gYpkoZFjBgnA/RIBkOCA7zX+sd9zRz9UzRzZzzzzzg5SzzyUzz6zzjixPai6DvMY:9qPwumEn1aEEiW1QUQOBXf785XRb
Checks for missing Authenticode signature.
resource |
---|
dfc167b8c3a99bf2f311a56342e3df7a6e2d1ee15d48a5fb57510df76d3d7301 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strncpy
_purecall
_makepath
_findclose
_CIsqrt
feof
strtok
fgets
_CIatan
_CItan
atoi
_CIcos
fwrite
_findfirst64i32
_splitpath
mbstowcs
wcstombs
malloc
strrchr
freopen
__iob_func
abort
vsprintf
calloc
strerror
_errno
_getcwd
_localtime64
_time64
_difftime64
localeconv
_access
strncat
_getdrive
_chdrive
_mkdir
_strdup
_stricmp
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABV01@@Z
_unlink
_strupr
_strnicmp
_chdir
??0exception@std@@QAE@ABQBDH@Z
__clean_type_info_names_internal
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__CppXcptFilter
_amsg_exit
_initterm_e
_initterm
_encoded_null
free
_malloc_crt
_onexit
_lock
__dllonexit
_unlock
_except_handler4_common
memset
??2@YAPAXI@Z
_CxxThrowException
setlocale
??_U@YAPAXI@Z
??_V@YAXPAX@Z
sscanf
sprintf
fopen
fprintf
fclose
__CxxFrameHandler3
strstr
strchr
fread
??3@YAXPAX@Z
?writeCommandNameToRegistry@AcadAppInfo@@QAE?AW4ErrorStatus@AcadApp@@PB_W0@Z
??1AcadAppInfo@@UAE@XZ
?onLoadArxApp@@YAXABVOdString@@@Z
?acedRestoreStatusBar@@YAXXZ
acedSetVar
acedGetVar
acedDefun
acedGetArgs
acutRelRb
?acrxUnlockApplication@@YA_NPAX@Z
?acrxRegisterAppMDIAware@@YA_NPAX@Z
ads_term_dialog
acedGetFunCode
acedRetVoid
??0AcDbObjectId@@QAE@XZ
acedMenuCmd
?acedIsMenuGroupLoaded@@YAHPB_W@Z
acedCommand
??0AcadAppInfo@@QAE@XZ
?setAppName@AcadAppInfo@@QAEXPB_W@Z
acedGetAppName
?setModuleName@AcadAppInfo@@QAEXPB_W@Z
?setAppDesc@AcadAppInfo@@QAEXPB_W@Z
?setLoadReason@AcadAppInfo@@QAEXW4LoadReasons@AcadApp@@@Z
?writeToRegistry@AcadAppInfo@@QAE?AW4ErrorStatus@AcadApp@@_N0@Z
?writeGroupNameToRegistry@AcadAppInfo@@QAE?AW4ErrorStatus@AcadApp@@PB_W@Z
?close@AcDbObject@@QAE?AW4ErrorStatus@Acad@@XZ
?comparedTo@AcRxObject@@UBE?AW4Ordering@AcRx@@PBV1@@Z
?isEqualTo@AcRxObject@@UBEHPBV1@@Z
?onUnloadArxApp@@YAXABVOdString@@@Z
??0AcRxObject@@IAE@XZ
?copyFrom@AcRxObject@@UAE?AW4ErrorStatus@Acad@@PBV1@@Z
?isA@AcDbDatabaseReactor@@UBEPAVAcRxClass@@XZ
?clone@AcRxObject@@UBEPAV1@XZ
?goodbye@AcDbDatabaseReactor@@UAEXPBVAcDbDatabase@@@Z
?headerSysVarChanged@AcDbDatabaseReactor@@UAEXPBVAcDbDatabase@@PB_WH@Z
?headerSysVarWillChange@AcDbDatabaseReactor@@UAEXPBVAcDbDatabase@@PB_W@Z
?objectOpenedForModify@AcDbDatabaseReactor@@UAEXPBVAcDbDatabase@@PBVAcDbObject@@@Z
?objectReAppended@AcDbDatabaseReactor@@UAEXPBVAcDbDatabase@@PBVAcDbObject@@@Z
?objectUnAppended@AcDbDatabaseReactor@@UAEXPBVAcDbDatabase@@PBVAcDbObject@@@Z
?proxyResurrectionCompleted@AcDbDatabaseReactor@@UAEXPBVAcDbDatabase@@PB_WAAV?$AcArray@VAcDbObjectId@@V?$AcArrayMemCopyReallocator@VAcDbObjectId@@@@@@@Z
??1AcRxObject@@UAE@XZ
acedRetNil
acedAlert
acutPrintf
acedArxUnload
acedRetStr
acedUndef
ord1929
ord408
ord1948
ord2050
GetModuleHandleA
GetModuleFileNameA
EncodePointer
DecodePointer
InterlockedExchange
Sleep
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
LocalFree
AllocConsole
GetStdHandle
GetActiveWindow
RegisterWindowMessageA
GetOpenFileNameA
CommDlgExtendedError
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
SHGetSpecialFolderPathA
VariantClear
odrxFree
odrxAlloc
??0OdString@@QAE@PB_W@Z
?comparedTo@OdRxObject@@UBE?AW4Ordering@OdRx@@PBV1@@Z
?copyFrom@OdRxObject@@UAEXPBV1@@Z
?clone@OdRxObject@@UBE?AVOdRxObjectPtr@@XZ
?isEqualTo@OdRxObject@@UBE_NPBV1@@Z
??1OdString@@QAE@XZ
?isA@OdRxModule@@UBEPAVOdRxClass@@XZ
??1OdRxObject@@UAE@XZ
?queryX@OdRxModule@@UBEPAVOdRxObject@@PBVOdRxClass@@@Z
?x@OdRxObject@@UBEPAV1@PBVOdRxClass@@@Z
?numRefs@OdRxObject@@UBEJXZ
acrxEntryPoint
odrxCreateModuleObject
odrxGetAPIVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ